5.3.2 Advanced User Accounts Configuration .................................................................. 67
5.4 Displaying Login Information upon Login ............................................................... 70
5.5 Configuring Web Security Settings ........................................................................ 71
5.6 Limiting OAMP Access to a Specific WAN Interface .............................................. 72
5.7 Web Login Authentication using Smart Cards ....................................................... 72
5.8 Configuring Web and Telnet Access List ............................................................... 73
5.9 Configuring RADIUS Settings ................................................................................ 74
6 CLI-Based Management .................................................................................... 75
6.1 Enabling CLI using Telnet ...................................................................................... 75
6.2 Enabling CLI using SSH and RSA Public Key ....................................................... 76
6.3 Establishing a CLI Session .................................................................................... 78
6.4 Configuring TACACS+ for CLI Login ..................................................................... 79
7 SNMP-Based Management ............................................................................... 81
7.1 Configuring SNMP Community Strings .................................................................. 81
7.2 Configuring SNMP Trap Destinations .................................................................... 82
7.3 Configuring SNMP Trusted Managers ................................................................... 83
7.4 Configuring SNMP V3 Users .................................................................................. 84
8 EMS-Based Management .................................................................................. 87
9 TR-069 CWMP Based Management ................................................................. 89
9.1 TR-069 ................................................................................................................... 89
9.2 TR-104 ................................................................................................................... 92
9.3 Configuring TR-069 ................................................................................................ 94
10 INI File-Based Management .............................................................................. 95
10.1 INI File Format ....................................................................................................... 95
10.1.1 Configuring Individual ini File Parameters ............................................................... 95
10.1.2 Configuring Table ini File Parameters ..................................................................... 95
10.1.3 General ini File Formatting Rules ............................................................................ 97
10.2 Loading an ini File .................................................................................................. 97
10.3 Modifying an ini File ............................................................................................... 98
10.4 Secured Encoded ini File ....................................................................................... 98
General System Settings ........................................................................................99
11 Configuring Certificates ................................................................................. 101
11.1 Replacing the Device's Certificate ....................................................................... 101
11.2 Loading a Private Key .......................................................................................... 102
11.3 Mutual TLS Authentication ................................................................................... 104
11.4 Self-Signed Certificates ........................................................................................ 104
11.5 Configuring Certificate Revocation Checking (OCSP) ......................................... 105
11.6 TLS Server Certificate Expiry Check .................................................................... 105
11.7 Loading Certificate Chain for Trusted Root .......................................................... 106
12 Date and Time .................................................................................................. 107
12.1 Configuring Date and Time Manually ................................................................... 107
12.2 Automatic Date and Time through SNTP Server ................................................. 107